An ethical hacker's view on mobile malware and how to stop it

10.04.2012
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.

As our mobile handsets become more than just a way to make and receive phone calls their appeal to criminals increases. , once theoretical, is now very much a reality and a growing threat.

For the business user that accesses the corporate net for email, compromised devices can give criminals access to data that can prove lucrative in the right hands. For VIPs it could be a little more personal, as the smart devices broadcast their locations via GPS. Even for the man on the street, with the introduction of , there's more to lose than just contact lists and photos.

DIRTY DOZEN:

IN PICTURES:

Malware on is used by criminals to make money. They steal information (contact details, emails, personal data or even financial information; they hijack browser sessions), interfere with online banking transactions and circumvent one time password (OTP) procedures, or even .